Behavioral task
behavioral1
Sample
2024-09-12_7e2196f0a094b7627e35767059a3f68d_cryptolocker.exe
Resource
win7-20240903-en
General
-
Target
2024-09-12_7e2196f0a094b7627e35767059a3f68d_cryptolocker
-
Size
76KB
-
MD5
7e2196f0a094b7627e35767059a3f68d
-
SHA1
4ce4a6c084e3fd8c1f019ea99ef645ad698e71d3
-
SHA256
78ba465d3185a5ce16f9d685192f9f9b368330583ed2a14cb2b889f51b7ae83d
-
SHA512
240d702c541ef2f3f78c20f5fda88169b6d59114da6b2afc2b709c6b9621d7bdeb423f782c3f8f41a4c7372502351c826ee3063b70d5c917d806a69694a0536f
-
SSDEEP
1536:P8mnK6QFElP6n+gymddpMOtEvwDpjIHsal81Ga:1nK6a+qdOOtEvwDpj7
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-09-12_7e2196f0a094b7627e35767059a3f68d_cryptolocker
Files
-
2024-09-12_7e2196f0a094b7627e35767059a3f68d_cryptolocker.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ap0x Size: 1024B - Virtual size: 785B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE